The State of VPN Security Today
Today’s post is authored by Christopher Nichols from SurfShark.com, who gives a quick insight of some of the main threats of surfing without protection in today’s Internet, and gives some valuable...
View ArticleUkraine election 2019 polls Maldoc: analysis
From Lab52 at S2 Grupo, we have recently detected a malicious document titled “Ukraine_election_2019_polls.doc”. The document was uploaded to Virustotal on March 12nd, 2019 from Germany. The title and...
View ArticleThe State of VPN Security Today
Today’s post is authored by Christopher Nichols from SurfShark.com, who gives a quick insight of some of the main threats of surfing without protection in today’s Internet, and gives some valuable...
View ArticleI discovered a crime … and now what?
[Author’s note: The author of this article is a technician, not a lawyer. Although several jurists have been consulted to corroborate that no legal barbarity has been said, it is strongly recommended...
View ArticleYaraRET (I): Carving with Radare2 & Yara
During the management of forensic cases, there are times when we find ourselves in a dead end, where after the detection of a critical compromise indicator, we have to approach an analysis with weak...
View ArticleCNA Tactics: a first proposal
(Editor’s note: this post was originally published in the Spanish version of Security Art Work on 11th November 2019) Today we have a doctrinal and somewhat metaphysical article… I.e., something dense....
View ArticleThe Importance of Server Hardening – Part 1. Introduction and Types of...
(Editor’s note: this post was originally published in the Spanish version of Security Art Work on 1st July 2019) Today we publish the first of three articles courtesy of Jorge García on the importance...
View ArticleThe fight for privacy
The post, next week. Own text. Original comic strip by RaphComic. Modified with permission. La entrada The fight for privacy aparece primero en Security Art Work.
View ArticleThe Importance of Server Hardening – Part 2. Hardening the Server
(Editor’s note: this post was originally published in the Spanish version of Security Art Work on 4th July 2019) Today we publish the second of three articles courtesy of Jorge Garcia on the importance...
View ArticleThe 5 Most Common Smart Contract Vulnerabilities
Today’s post is authored by Stefan Beyer, CEO @ Cryptonics, Blockchain Consultant and Smart Contract Auditor. Please enjoy. Smart contracts are hard to get right. Their three main properties, the...
View ArticleWhat Recent Supply Chain Attacks On IOTA and Monero Can Teach Us About...
Today’s post is authored by Stefan Beyer, CEO @ Cryptonics, Blockchain Consultant and Smart Contract Auditor. If you are interested in learning about blockchain technology, we recommend you to check...
View ArticleGuide to Assessing Your Organization’s Internal Cybersecurity Readiness in 2020
Today’s post is authored by Robert Mardisalu, co-founder & editor of TheBestVPN.com, a computer security professional, privacy specialist and cybersecurity writer. He has written for many...
View ArticleChina: From culture to conflict in the cyberspace
Since in 2013 the US cybersecurity consultancy Mandiant published its famous report about APT1, showing its links with different agencies presumably associated with the Chinese government, the news...
View ArticleBusiness Continuity Plan: before and after COVID-19
The current pandemic situation caused by the infamous COVID-19 (or Coronavirus) is impacting all areas of society: the first and most important, that of public health and the individual’s inherent...
View ArticleEvading web blockages by using a web server on port-forwarder GO
After his last dispute (https://www.securityartwork.es/2018/02/26/evadiendo-av-shellter-tambien-sysmon-wazuh-i/), Pepote decided to rehire Pepito, who at heart was a good worker. But before that,...
View Article